Cited By
View all- Urdaneta GPierre GSteen M(2011)A survey of DHT security techniquesACM Computing Surveys10.1145/1883612.188361543:2(1-49)Online publication date: 4-Feb-2011
- Vo HChen COoi B(2010)Towards elastic transactional cloud storage with range query supportProceedings of the VLDB Endowment10.14778/1920841.19209073:1-2(506-514)Online publication date: 1-Sep-2010
- Rao PMoon B(2009)Locating XML Documents in a Peer-to-Peer Network Using Distributed Hash TablesIEEE Transactions on Knowledge and Data Engineering10.1109/TKDE.2009.2621:12(1737-1752)Online publication date: 1-Dec-2009
- Show More Cited By